Sciweavers

134 search results - page 11 / 27
» Extreme events
Sort
View
PERCOM
2004
ACM
14 years 7 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva
IV
2008
IEEE
89views Visualization» more  IV 2008»
14 years 2 months ago
A Practical Way for Projects to Visualize Design Rationale
Design rationale remains poorly explained and rarely modelled on projects in industry. However, the reasons for design decisions are important when a specification has to be re-ex...
Ian Alexander
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Wireless Sensor Networks for Health Monitoring
We propose a platform for health monitoring using wireless sensor networks. Our platform is a new architecture called CustoMed that will reduce the customization and reconfigurat...
Roozbeh Jafari, Andre Encarnacao, Azad Zahoory, Fo...
PDCAT
2004
Springer
14 years 1 months ago
State Machine Based Operating System Architecture for Wireless Sensor Networks
A wireless sensor network is characterized as a massively distributed and deeply embedded system. Such a system requires concurrent and asynchronous event handling as a distributed...
Tae-Hyung Kim, Seongsoo Hong
KDD
1998
ACM
105views Data Mining» more  KDD 1998»
13 years 12 months ago
PlanMine: Sequence Mining for Plan Failures
This paper presents the PLANMINE sequence mining algorithm to extract patterns of events that predict failures in databases of plan executions. New techniques were needed because ...
Mohammed Javeed Zaki, Neal Lesh, Mitsunori Ogihara